FEATURE STORY
DataLocker Introduces Sentry 5: The Ultimate Hardware Encrypted USB Flash Drive for Compliance and Security
Read MoreWelcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.
Use this handy guide to know the key questions to ask vendors who claim to have encrypted storage devices but use Chinese encryption chips.
Hezbollah, designated a terrorist organization by the United States and many other countries due to its history of carrying out international terrorist attacks, recently experienced a highly sophisticated attack where thousands of its pagers exploded simultaneously across Lebanon, resulting in numerous deaths and injuries. The blasts, which targeted communication devices believed to be secure, serve […]
China’s aggressive stance on national and cyber security has raised significant concerns worldwide, particularly regarding the implications for technology products manufactured by Chinese companies. Central to these concerns are encryption chips produced by organizations headquartered in China, which are increasingly being scrutinized for potential security vulnerabilities, including hidden backdoors. This article explores the impact of […]
In the fight against USB-related threats, IT security professionals are increasingly adopting a defense-in-depth approach. This strategy involves multiple layers of security to protect sensitive data and systems from potential breaches. Based on the research findings in the 2024 State of USB-Connected Devices, on average, organizations implement 2.5 layers of security to guard against USB […]
In today’s complex cybersecurity landscape, understanding the nuances of real-world attacks versus the perceptions of IT professionals is crucial for effective threat mitigation. The Honeywell Gard USB Threat Report 2024 and DataLocker’s 2024 State of USB-Connected Devices report provide valuable insights into these dynamics, particularly concerning malware attacks via USB-connected devices. Let’s delve into the […]
In today’s rapidly evolving technological landscape, ensuring the security and reliability of devices used in the workplace is paramount. Whether it’s USB storage devices, headsets, or webcams, the certifications held by these devices play a crucial role in safeguarding organizational data and maintaining compliance with industry standards. Despite this, many organizations overlook the importance of […]
In the realm of data management, a significant gap exists between the perceptions and practices of IT professionals and end users. According to the 2024 State of USB-Connected Device Report, 55% of IT professionals claim their organizations utilize data deletion for USB devices. Conversely, 30% of end users believe that deleting a file makes it […]
The Inherent Risks of USB Devices USB devices, initially designed for their universal connectivity, carry significant security risks. The term USB stands for “universal serial bus,” highlighting its intended purpose to connect various devices seamlessly to an endpoint. This convenience, however, comes with inherent security vulnerabilities that need to be addressed, especially in an era […]
Do you currently own Kingston IronKey and other Kingston managed drives like DT4000G2DM , DTVPM and DTVP30DM? If so, it’s crucial to understand the upcoming End of Life (EoL) for these products, how it impacts your data security strategy, and what steps you need to take to ensure seamless continuity. When will Kingston IronKey managed […]
Securing offline machines in Operational Technology (OT) environments is essential because of their distinctive challenges and risks. While offline machines within OT environments are as susceptible to security breaches as their online counterparts, they often endure less scrutiny when it comes to security threats. Organizations are not always aware if their OT environments have been […]